Search For:

Displaying 1-22 out of 22 total
From Auto-adaptive to Survivable and Self-Regenerative Systems
Found in: Network Computing and Applications, IEEE International Symposium on
By Michael Atighetchi, Partha Pal
Issue Date:July 2009
pp. 98-101
This paper charts the course of adaptive behavior in intrusion tolerance, starting from pre-programmed and user-controlled reactive adaptation to highly sophisticated autonomic and cognitively driven adaptation. The goal of intrusion-tolerance is to provid...
Advanced Protected Services - A Concept Paper on Survivable Service-Oriented Systems
Found in: Object/Component/Service-Oriented Real-Time Distributed Computing Workshops , IEEE International Symposium on
By Partha Pal, Michael Atighetchi, Joseph Loyall, Andrew Gronosky, Charles Payne, Robert Hillman
Issue Date:May 2010
pp. 158-165
As newer software construction paradigms like service-oriented architecture (SOA) are adopted into systems of critical importance, it becomes imperative that technology and design artifacts exist that can be utilized to raise the resiliency and protection ...
Understanding the Vulnerabilities of a SOA Platform - A Case Study
Found in: Network Computing and Applications, IEEE International Symposium on
By Andrew Gronosky, Michael Atighetchi, Partha Pal
Issue Date:July 2010
pp. 182-187
Service-oriented architecture (SOA) is a powerful distributed computing paradigm that provides high-level abstractions for developing, deploying, and executing distributed systems while hiding many platform-level details. SOA platforms host functionality a...
Secure and QoS-Managed Information Exchange Between Enterprise and Constrained Environments
Found in: 2014 IEEE 17th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC)
By Partha Pal,Michael Atighetchi,Nathaniel Soule,Vatche Ishakian,Joseph Loyall,Robert Grant,Asher Sinclair
Issue Date:June 2014
pp. 141-149
Mobile devices performing mission-critical functions at the tactical edge, such as those employed by first responders, military personnel, and law enforcement, operate in environments that are vastly different from enterprise computing environments. In spi...
A Survey of Security Concepts for Common Operating Environments
Found in: Object/Component/Service-Oriented Real-Time Distributed Computing Workshops , IEEE International Symposium on
By Joseph Loyall, Kurt Rohloff, Partha Pal, Michael Atighetchi
Issue Date:March 2011
pp. 244-253
As newer software engineering technologies, such as Service-Oriented Architecture (SOA), become the basis for mission-critical systems, they must include security as a foundational capability. This paper highlights security concepts relevant to using SOA a...
Managed Mission Assurance - Concept, Methodology and Runtime Support
Found in: Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust, 2010 IEEE International Conference on
By Partha Pal, Kurt Rohloff, Michael Atighetchi, Rick Schantz
Issue Date:August 2010
pp. 1159-1164
We interpret “mission assurance” to mean the guarantee that Mission Essential Functionality (MEF) provided by an information system is continued despite partial failures and other accidental or maliciously induced changes in the system or its operating env...
Transparent Insertion of Custom Logic in HTTP(S) Streams Using PbProxy
Found in: IEEE Internet Computing
By Michael Atighetchi, Brett Benyo, Abhimanyu Gosain, Robert MacIntyre, Partha Pal, Virginia Travers, John Zinky
Issue Date:May 2011
pp. 43-50
<p>Cost and testing considerations limit the acceptance and deployment of technologies that make information exchanges more secure, reliable, semantically understandable, and self-improving. PbProxy is a flexible proxy that enables transparent insert...
Attribute-Based Prevention of Phishing Attacks
Found in: Network Computing and Applications, IEEE International Symposium on
By Michael Atighetchi, Partha Pal
Issue Date:July 2009
pp. 266-269
This paper describes a set of innovative attribute based checks for defending against phishing attacks. We explain a number of anti-phishing algorithms implemented as plugins and highlight which attributes of phishing sites they consider.To assess the effe...
The PhishBouncer Experience
Found in: Conference For Homeland Security, Cybersecurity Applications & Technology
By Partha Pal, Michael Atighetchi
Issue Date:March 2009
pp. 150-154
This extended abstract summarizes the technical results developed under the PhishBouncer project (October 2005 to May 2007), where the authors collaborated with researchers from Symantec Research Lab (SRL). The goal of this project was to develop middlewar...
Effective Monitoring of a Survivable Distributed Networked Information System
Found in: Availability, Reliability and Security, International Conference on
By Paul Rubel, Michael Atighetchi, Partha Pal, Martin Fong, Richard O'Brien
Issue Date:March 2008
pp. 1306-1312
In 2002, DARPA put together a challenging proposition to the research community: demonstrate using an existing information system and available DARPA developed and other COTS technologies that a very high level of survivability against unconstrained attack...
Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing
Found in: Network Computing and Applications, IEEE International Symposium on
By Partha Pal, Franklin Webber, Michael Atighetchi, Nate Combs
Issue Date:July 2006
pp. 285-292
Modern distributed information systems handle increasingly critical data and computation, but there is no systematic way to assess whether a given part of the system can be entrusted with such data and computation on a continuous basis. In a highly interco...
Networking Aspects in the DPASA Survivability Architecture: An Experience Report
Found in: Network Computing and Applications, IEEE International Symposium on
By Michael Atighetchi, Paul Rubel, Partha Pal, Jennifer Chong, Lyle Sudin
Issue Date:July 2005
pp. 219-222
<p>The same network infrastructure that is essential for the operation of today?s high valued distributed systems can also be misused by malicious attackers. Experience shows that implementing absolute security or preventing cyber attacks completely ...
Adaptive Cyberdefense for Survival and Intrusion Tolerance
Found in: IEEE Internet Computing
By Michael Atighetchi, Partha Pal, Franklin Webber, Richard Schantz, Christopher Jones, Joseph Loyall
Issue Date:November 2004
pp. 25-33
While providing some resistance against cyberattacks, current approaches to securing networked and distributed information systems are mainly concerned with static prevention measures. For example, signature-based systems can only detect known attacks and ...
Integrated Adaptive QoS Management in Middleware: A Case Study
Found in: Real-Time and Embedded Technology and Applications Symposium, IEEE
By Christopher D. Gill, Joseph P. Loyall, Richard E. Schantz, Michael Atighetchi, Jeanna M. Gossett, David Corman, Douglas C. Schmidt
Issue Date:May 2004
pp. 276
Distributed real-time and embedded (DRE) systems in which application requirements and environmental conditions may not be known a priori-or which may vary at run-time-can benefit from an adaptive approach to management of quality-of-service (QoS) to meet ...
Building Auto-Adaptive Distributed Applications: The QuO-APOD Experience
Found in: Distributed Computing Systems Workshops, International Conference on
By Michael Atighetchi, Partha P. Pal, Christopher C. Jones, Paul Rubel, Richard E. Schantz, Joseph P. Loyall, John A. Zinky
Issue Date:May 2003
pp. 104
Exploiting autonomic adaptation in defending a distributed application is a relatively new research area. We describe how the QuO adaptive middleware was used to implement auto-adaptive defenses ranging from simple rapid-response sensor-actuator tactics to...
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense
Found in: Network Computing and Applications, IEEE International Symposium on
By Michael Atighetchi, Partha Pal, Franklin Webber, Christopher Jones
Issue Date:April 2003
pp. 179
Attacks against distributed systems frequently start at the network layer by gathering network related information (such as open TCP ports) and continue on by exhausting resources, or abusing protocols. Defending against network-based attacks is a major fo...
Packaging Quality of Service Control Behaviors for Reuse
Found in: Object-Oriented Real-Time Distributed Computing, IEEE International Symposium on
By Richard Schantz, Joseph Loyall, Michael Atighetchi, Partha Pal
Issue Date:May 2002
pp. 0375
Two limitations of the current implementations of adaptive QoS behaviors are complexity associated with inserting them into common application contexts and lack of reusability across applications. What is needed is a way of bundling all the specification f...
Comparing and Contrasting Adaptive Middleware Support in Wide-Area and Embedded Distributed Object Applications
Found in: Distributed Computing Systems, International Conference on
By Joseph Loyall, Richard Schantz, John Zinky, Partha Pal, Richard Shapiro, Craig Rodrigues, Michael Atighetchi, David Karr, Jeanna M. Gossett, Christopher D. Gill
Issue Date:April 2001
pp. 0625
Abstract: The Quality Objects (QuO) middleware is a set of extensions to standard distributed object computing middleware that is used to control and adapt quality of service in a number of distributed application environments, from wide-area to embedded d...
Dynamic cross domain information sharing: a concept paper on flexible adaptive policy management
Found in: Proceedings of the 3rd ACM workshop on Assurable and usable security configuration (SafeConfig '10)
By Azer Bestavros, Jonathan Webb, Joseph Loyall, Michael Atighetchi, Michael J. Mayhew, Partha Pal
Issue Date:October 2010
pp. 83-88
Information exchange across domains is essential for today's asymmetric warfare environment to make mission-critical information available to war fighters, no matter where it exists and when it becomes available. Dissemination of new information needs to c...
Adjustable autonomy for cross-domain entitlement decisions
Found in: Proceedings of the 3rd ACM workshop on Artificial intelligence and security (AISec '10)
By Jacob Beal, Jonathan Webb, Michael Atighetchi
Issue Date:October 2010
pp. 65-71
Cross-domain information exchange is a growing problem, as business and governmental organizations increasingly need to integrate their information systems with those of partially trusted partners. Current identity management and access control technologie...
An abstract interface for cyber-defense mechanisms
Found in: Proceedings of the 4th annual workshop on Cyber security and informaiton intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead (CSIIRW '08)
By Franklin Webber, Michael Atighetchi, Partha Pal, Paul Rubel
Issue Date:May 2008
pp. N/A
Defending a computer system against malicious attack depends on making many different defense mechanisms work together. In addition to protecting against intrusions, these mechanisms should provide intrusion detection and response. The semantics of input a...
Automating cyber-defense management
Found in: Proceedings of the 2nd workshop on Recent advances on intrusiton-tolerant systems (WRAITS '08)
By Franklin Webber, Michael Atighetchi, Partha Pal, Paul Benjamin, Paul Rubel
Issue Date:April 2008
pp. 1-6
Last year, we reported [1] our success in setting a new high-water mark for intrusion tolerance. That success can largely be attributed to our use of a "survivability architecture", which refers to the organization of a set of concrete defense mechanisms f...